mka-sec's Stars
Traxes/zeno
Automatic Vulnerability Discovery
NationalSecurityAgency/ghidra
Ghidra is a software reverse engineering (SRE) framework
j00ru/ctf-tasks
An archive of low-level CTF challenges developed over the years
niklasb/hack2win-chrome
This is collaborative work of Ned Williamson and Niklas Baumstark
vngkv123/aSiagaming
My Chrome and Safari exploit code + write-up repo
W00dL3cs/exploit_playground
angr/angr-management
The official angr GUI.
m1ghtym0/browser-pwn
An updated collection of resources targeting browser-exploitation.
Dor1s/libfuzzer-workshop
Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.
Escapingbug/awesome-browser-exploit
awesome list of browser exploitation tutorials
saelo/35c3ctf
Source code and exploits for some 35c3ctf challenges.
bkerler/exploit_me
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
NeatMonster/AMIE
A Minimalist Instruction Extender for the ARM architecture and IDA Pro
Vector35/community-plugins
Repository for community provided Binary Ninja plugins
R3x/How2Kernel
This Repository aims at giving a basic idea about Kernel Exploitation.
tharina/BlackHoodie-2018-Workshop
Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.
externalist/exploit_playground
Analysis of public exploits or my 1day exploits
vulhub/vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
EdOverflow/bugbountywiki
The Bug Bounty Wiki
adamdoupe/ctf-training
TowerofHanoi/ctf-training
Repository with the material of the Tower of Hanoi introductory briefings on binary exploitation
malus-security/sandblaster
Reversing the Apple sandbox
FSecureLABS/CVE-2018-4121
macOS 10.13.3 (17D47) Safari Wasm Exploit
invictus1306/Workshop-BSidesMunich2018
ARM shellcode and exploit development - BSidesMunich 2018
theori-io/zer0con2018_singi
theori-io/zer0con2018_bpak
Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome
theori-io/pwnjs
A Javascript library for browser exploitation
Siguza/ios-resources
Useful resources for iOS hacking
phoenhex/files
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.